-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Will there be a production version in the future? #1
Comments
On Tue, 10 Mar 2015, rsenger2 wrote:
I'm happy to work on bugs and maintain it - I do plan to pick this up
It is still very useful. For instance when you have an mobile phone that |
I'm working on an updated version of this and added multipart support to my fork: https://github.com/DanWin/openpgpkey-milter |
Awesome! I’ll look at merge and release - sorry I haven’t given this project much attention lately !
Sent from mobile device
… On Apr 13, 2019, at 11:46, Daniel Winzen ***@***.***> wrote:
I'm working on an updated version of this and added multipart support to my fork: https://github.com/DanWin/openpgpkey-milter
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub, or mute the thread.
|
I'll give it a few enhancement the next time. |
On Mon, 18 Sep 2023, ne20002 wrote:
This is on my list
[/] add config file
[/] allow skipping processing for domains
[ ] allow skipping processes for configured recipients (not the whole domain)
Yes, I have done some hardcoding on my running copy to do that :)
[ ] add an additional query to keys.openpgp.org (as many users of public email providers don't have the option to add dns entries or
email providers run a wkd)
Note that if you want to add support for generic key servers where
anyone can upload anything, that those keys have much less trust
than keys from DNSSEC. At the very least, there should be a local
keyring that is attempted before pulling from HKP keyservers.
[ ] cover the use case where there are recipients with and without pgp key by splitting the email and send one unencrypted and one
encrypted
sure :)
|
I got a few chnages running but I need further testing. I also realized that the use cases a (as no key for any recipient) and b (keys for all recipients) are easily to handle but the case c (keys for only some of the recipients) seems to not be solvable with a milter as it can't split messages into two. So 'letting go plaintext' is the only option here. But I will give some analyses on postfix content filters. maybe there is a solution. At least, for my use case, where messages mostly have only single recipients, the milter works well. |
I just managed to get this to work, after changing RRtype to 61 and removing base64 decoding of the keys.
My question, is this considered to be experimental only and forever, or will there be an update that can deal with multipart messages (especially, pgp signed messages delivered from an email client) and maybe dlv (I still need to use dlv.isc.org trust anchor...)?
I understand that real end-to-end encryption requires client side encryption, but I think this milter is interesting if the mail server is trusted (e.g. for companies).
The text was updated successfully, but these errors were encountered: